Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
10 pages
1 file
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where anything like technology, tool, and the result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. This paper presents the concept of a high-interaction honeypot, Kerberos authentication system as a service in a cloud environment to implement the benefits of, such service to ably distinguish between hackers and users and to provide overall security to the data/network.
KERBEROS AUTHENTICATION MODEL FOR DATA SECURITY IN CLOUD COMPUTING USING HONEY-POT, 2019
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where anything like technology, tool, and the result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. This paper presents the concept of a high-interaction honeypot, Kerberos authentication system as a service in a cloud environment to implement the benefits of, such service to ably distinguish between hackers and users and to provide overall security to the data/network.
2019
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in Cloud environment where anything like technology, tool, and result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. Production honeypot is one of the types of honeypot which is used to solve the problem of data security in organizations. Honeypot techniques are used to detains the actions of intruder and create a log-file for providing better security in to the cloud network. Kerberos is a protocol for validating the services which requests between true hosts across the network, such as the internet. Kerberos builds on symmetric key cryptography and needed trusted third party, Key Distribution Centre(KDC) which uses public key cryptography. This paper presents the concept of production and research Honeypot as a service in cloud environment by implementing the benefits of Kerberos Authentication system, which distinguishes between hackers and users, and to provide overall security to the data/network.
Engineering Publication House, 2019
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in Cloud environment where anything like technology, tool, and result can be offered as a service. Purveyors offer and deliver such services to their customers via the network. Production honeypot is one of the types of honeypot which is used to solve the problem of data security in organizations. Honeypot techniques are used to detains the actions of intruder and create a log-file for providing better security in to the cloud network. Kerberos is a protocol for validating the services which requests between true hosts across the network, such as the internet. Kerberos builds on symmetric key cryptography and needed trusted third party, Key Distribution Centre (KDC) which uses public key cryptography. This paper presents the concept of production and research Honeypot as a service in cloud environment by implementing the benefits of Kerberos Authentication system, which distinguishes between hackers and users, and to provide overall security to the data/network.
Internet security is a vital issue of recent times. It is necessary to protect our assets or valuable data from unauthorised person. There area number of techniques available, one of them is honeypot. Honeypots are modern approach to give high level security to our data. Honeypot can be deployed at victim’s site to attract and divert an attacker from their intended source or targets. Honeypots have the big advantage that they do not give the vital information to the unauthorised person because each traffic is observed by this security mechanism. This fact enables the system to log every byte that passes from network as well as from honeypot and it relates this data with other sources to find the real source of attack as well as attacker. In this paper the brief introduction of honeypots and the types and its uses are described. This paper would also give introduction about Kerberos. Finally we shall conclude by looking at the future of honeypot using Kerberos.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
The rapid increase in the number of users, there is a rise in issues related to hardware failure, web hosting, space and memory allocation of data, which is directly or indirectly leading to the loss of data. With the objective of providing services that are reliable, fast and low in cost, we turn to cloud-computing practices. With a tremendous development in this technology, there is ever increasing chance of its security being compromised by malicious users. A way to divert malicious traffic away from systems is by using Honeypot. It is a colossal strategy that has shown signs of improvement in security of systems. Keeping in mind the various legal issues one may face while deploying Honeypot on third-party cloud vendor servers, the concept of Honeypot is implemented in a file-sharing application which is deployed on cloud server. This paper discusses the detection attacks in a cloud-based environment as well as the use of Honeypot for its security, thereby proposing a new technique to do the same.
Mobile Information Systems
This rapidly changing digital world is always sensitive to improving security and resilience to protect the inhabitants of this ecosystem in terms of data, processes, repositories, communication, and functions. The transformation of this digital ecosystem is heavily dependent on cloud computing, as it is becoming the global platform for individuals, corporates, and even governments. Therefore, the concerns related to security are now linked closely with cloud computing. In this paper, a multi-cloud security framework takes a view on the development of security mechanisms to provide a diversion to the attacker. The purpose is to gain more time to analyze the attack and mitigate the intrusion without compromises. This mechanism is designed using the honeypot technology that has been around for some time but has not been used in cloud computing and other technologies. The proposed framework provides modules related to managing the multi-cloud platform, the intrusion detection and preve...
Cloud Computing means accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Now here in this paper an efficient technique of intrusion detection is proposed using the concept of honeypots. The data to be send by the cloudlets is accessed by the brokers of the cloud where we have implemented some of the rules for the detection of intrusions. The proposed technique implemented here provides less false alarm ratio and provides more accuracy for the detection of intrusions.
IFIP Advances in Information and Communication Technology, 2012
Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Traditional Anomaly Detection based IDS may generate more number of false positives. In this paper, we attempt to amalgamate IDS with Cloud computing. Introducing Honeypot in Cloud IDS design can greatly help in detecting potential attacks with reduced number of false positives. This research work provides an impetus to strengthen network security aspects related to Cloud computing to make it more trustworthy.
International Journal of Computer Applications, 2013
Nowadays, many public sectors lead their services to cloud to perform the various tasks. It is creates their computing process available more easily to users. However, it is also together brings new security attacks and challenges about safety and reliability. The propose system plan to deploy a Honeypot in the IDPS architecture to ensure improve performance, it is desire to increase the level of security in the Cloud computing environment and decrease the threats to Cloud environments through concentrating on the problem of how data are stored in the Cloud. The propose system is effective and efficient model term as the integrated Intrusion Detection and Prevention System (IDPS) and Honeypot that can be used to guard an organization. In this system also integrates two methods namely, Anomaly Detection (AD) and Signature Detection (SD) that can do in cooperation to detect various attacks and deny them through the ability of IPS. The goal of this paper is to detect internal attackers by Honeypot.
2015
In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to the network. This paper mainly focuses on honeypot mechanism. Honeypot is an exciting new technology with enormous potential for security communities. It is a computer system on the Internet that is expressly set up to attract and "trap" people who attempt to penetrate other people's computer systems. This paper is the summary of honeypot mechanism which is taken from 20+ research paper. Though the honeypot term is not new for us, there are many research has been done day by day to improve the security over network. In this paper the recent survey of honeypot mechanism over cloud by Alert logic 2014 has been included. This paper discusses about the concept of honeypot, history of honeypot, discusses about why company should have implement honeypot technology, application of honeypot....
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Data and Network Science
Proceedings of the International Conference on Security and Cryptography, 2012
HONEY-SYSTEM: DESIGN, IMPLEMENTATION AND ATTACK ANALYSIS, 2018
Journal of information security and applications, 2018
Dynamic honeypot deployment in the cloud, 2022
International Journal of Recent Trends in Engineering and Research, 2017